CN109804670A - Dynamic access is forbidden - Google Patents

Dynamic access is forbidden Download PDF

Info

Publication number
CN109804670A
CN109804670A CN201680089772.4A CN201680089772A CN109804670A CN 109804670 A CN109804670 A CN 109804670A CN 201680089772 A CN201680089772 A CN 201680089772A CN 109804670 A CN109804670 A CN 109804670A
Authority
CN
China
Prior art keywords
terminal
network
control parameter
access
connection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201680089772.4A
Other languages
Chinese (zh)
Other versions
CN109804670B (en
Inventor
A·贝里格伦
L·诺尔德
B·马丁
魏宇欣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sony Corp
Sony Mobile Communications AB
Original Assignee
Sony Corp
Sony Ericsson Mobile Communications AB
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sony Corp, Sony Ericsson Mobile Communications AB filed Critical Sony Corp
Publication of CN109804670A publication Critical patent/CN109804670A/en
Application granted granted Critical
Publication of CN109804670B publication Critical patent/CN109804670B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/08Testing, supervising or monitoring using real traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/0284Traffic management, e.g. flow control or congestion control detecting congestion or overload during communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/11Allocation or use of connection identifiers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities
    • H04W8/24Transfer of terminal data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2854Wide area networks, e.g. public data networks
    • H04L12/2856Access arrangements, e.g. Internet access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/28Restricting access to network management systems or functions, e.g. using authorisation function to access network configuration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Databases & Information Systems (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

UE (130) be configured as with the first of network connect in from network receive control parameter (5013).UE (130) is additionally configured to based on control parameter (5013), selectively forbids access of the UE (130) to network for subsequent second connection.

Description

Dynamic access is forbidden
Technical field
Present invention relates in general to forbid accessing terminal to network.Present invention relates particularly to from network based on previously having received Control parameter forbids accessing terminal to network.
Background technique
In the wireless network, access category forbid (ACB:Access Class Barring) be avoid traffic overload and With respect to second terminal connection and pay the utmost attention to the concept of the connection of first terminal.
For example, according to third generation partner program (3GPP) technical specification (TS) 22.011V 14.0.0 (2015-09): Section 4 " access control (Access Control) ", it is known that for preventing terminal (sometimes referred to as user equipment, UE) to 3GPP The technology of long term evolution (LTE) cellular network progress access attempts.
These technologies face certain limitations and disadvantage.It is realized according to reference, ACB is generally attempted to by using predefined/quiet Business in wireless access network (RAN) of the state statistical technique to reduce network.For example, based on given subscriber and the shifting being randomly assigned The association of the fixed allocation of moving mouth (access category AC) determines ACB.It is certain based on the bans policy from transmission of network to UE Access category can obey ACB constraint.It has been found that customizing ACB based on the different demands of different operators may be difficult.
Summary of the invention
Therefore, it is necessary to the advanced technologies of ACB.Particularly, need to overcome or alleviated by least some above-mentioned limitations and disadvantage Technology.
The feature of independent claims meets this needs.Dependent claims define embodiment.
In one example, a kind of UE be configured as with the first of network connect in via Radio Link from the network Receive control parameter.The UE is additionally configured to selectively forbid based on the control parameter for subsequent second connection Access of the UE to the network.
According to an example, a kind of method include terminal in the first connection between the terminal and network from the network Receive control parameter.This method further includes that the terminal is based on the control parameter, between the terminal and the network Subsequent second connection selectively forbid access to the network.
According to an example, a kind of computer program includes the program code that can be executed by least one processor.It holds Row said program code makes at least one described processor execute method.The method includes terminal the terminal and network it Between first connection in from the network receive control parameter.The method also includes the terminals to be based on the control parameter, Selectively forbid the access to the network for subsequent second connection between the terminal and the network.
According to an example, a kind of computer program product includes can be by program generation that at least one processor executes Code.Executing said program code makes at least one described processor execute method.The method includes terminal the terminal with Control parameter is received from the network in the first connection between network.The method also includes the terminals to be based on the control Parameter selectively forbids the access to the network for subsequent second connection between the terminal and the network.
According to an example, the network node of network is configured as in the first connection of the network node and UE via nothing Wired link sends control parameter to the UE.The control parameter enables to forbid described UE pairs for subsequent second connection The access of the network.
According to an example, a kind of method include with the first of UE connect in the UE send control parameter.It is described Control parameter enables to forbid access of the UE to the network for subsequent second connection.
According to an example, a kind of computer program includes the program code that can be executed by least one processor.By At least one described processor, which executes said program code, makes at least one described processor execute method.The method includes With the first of UE connect in the UE send control parameter.The control parameter enables to prohibit for subsequent second connection Only access of the UE to the network.
According to an example, computer program product includes the program code that can be executed by least one processor.By At least one described processor, which executes said program code, makes at least one described processor execute method.The method includes With the first of UE connect in the UE send control parameter.The control parameter enables to prohibit for subsequent second connection Only access of the UE to the network.
According to an example, a kind of system includes terminal and network node.The network node was configured as at the end Control parameter is sent to the terminal via Radio Link in the first connection between end and the network node.The terminal quilt It is configured to the control parameter, selectively forbids the terminal to connect the network for subsequent second connection Enter.
In other examples, above-mentioned various examples can be selectively combined with each other.For example, it is possible that various being shown according to above-mentioned The network node and UE of example are the component parts that is mutually related of system.
It should be understood that features described above and the following feature that may also be noticed that can not only make in each combination of instruction With, and can be without departing from the scope of the invention with other combinations or exclusive use.
Detailed description of the invention
Fig. 1 schematically illustrates the network according to each embodiment, which includes core net and for mentioning to UE For the RAN of access.
Fig. 2 is the signaling for forbidding UE access network based on bans policy schematically illustrated according to each embodiment Figure.
Fig. 3 is schematically to illustrate the state for the different conditions connecting between UE and network according to each embodiment Figure.
Fig. 4 schematically illustrates the default bearing and dedicated bearer between UE and network according to each embodiment, These carryings realize the connection between UE and network.
Fig. 5 is schematically illustrated to be sliced according to the network of the core net of each embodiment.
Fig. 6 is schematically to illustrate the communication of the control parameter for being able to carry out access barred according to each embodiment Signaling diagram.
Fig. 7, which is schematically illustrated, to join according to the considerations of each embodiment to control associated with heterogeneous networks slice Several multiple classifications and the certainty bans policy limited.
Fig. 8, which is schematically illustrated, to join according to the considerations of each embodiment to control associated with heterogeneous networks slice Several multiple classifications and the bans policy limited, wherein the bans policy defines associated with some classification for forbidding The probability of UE access.
Fig. 9 schematically illustrates the bans policy of the Limited service quality threshold according to each embodiment.
Figure 10 is schematically illustrated according to the transmission bans policy of each embodiment to be forbidden based on the bans policy To the signaling diagram of the access of network.
Figure 11 schematically illustrates the UE according to each embodiment.
Figure 12 is the flow chart according to the method for each embodiment.
Figure 13 schematically illustrates the base station according to each embodiment.
Figure 14 is the flow chart according to the method for each embodiment.
Specific embodiment
Hereinafter, embodiments of the present invention are described in detail with reference to the accompanying drawings.Below not to the description of embodiment It should be considered in a limiting sense.The scope of the present invention by embodiments described hereinafter or is not considered as being only illustrative attached Figure is limited.
Attached drawing is considered as that the element for schematically indicating, and illustrating in attached drawing is not necessarily to scale and shows.Phase Instead, various elements are expressed so that their function and general purpose will be apparent to those skilled in the art. It is shown in the accompanying drawings or any company between functions described in this article block, equipment, component or other physics or functional unit Connecing or coupling can also be realized by being indirectly connected with or coupling.Functional block can be with hardware, firmware, software or combinations thereof come real It is existing.
Hereinafter, for forbidding UE to the access of network come description technique.Forbid access that can be related to preventing UE and net The initialization of connection between network.Access is forbidden to can contribute to reduce the overload of the RAN of network.For example, as emergency Or under the overload situations of congestion, access barred may be beneficial.In general, access barred is realized by the logic in UE.Therefore, energy Enough reduce the signaling (for example, a part as radio access technology) on Radio Link: this may be since UE is in transmission Downlink control message is to seek before the access to network to try to be the first to prohibit access.That is, network may be unaware that some UE just In the access barred of execution, because it is not notified accordingly.
According to some examples, access barred is realized based on each UE.It is connect i.e., it is possible to be individually controlled for each UE Enter to forbid.Alternately or in addition, various technologies described herein can be used to be grouped into a kind of multiple UE.This has When referred to as ACB.ACB is a kind of access barred of special shape.ACB is not based on what each UE was realized, but uses UE's Group/class is realized.
For example, the multiple UE being grouped into same class can correspond to each other for one or more device attributes.Example Device attribute includes: the communication capacity of UE, narrowband or broadband connections, low time delay service etc.;The device type of UE, it is such as narrow Band Internet of Things (NB-loT) equipment and machine type communication (MTC) equipment etc.;Network slice associated with UE;The access class of UE Not, for example, being hard coded into subscriber identity module (SIM);And the operator of subscriber associated with UE.Access barred can be with Based on control parameter.Control parameter can be provided from network to UE.Because control parameter is not with UE fixed correlation (for example, hard It is encoded in the SIM associated with UE of subscriber), it is possible to different control parameters is dynamically assigned to the same UE. Thus, it is possible to dynamically change the access barred of UE.
This dynamic access forbids that various effects can be promoted.Such as, it may be possible to it is connect with fine granularity level realization Enter to forbid.If can be assigned control parameters to compared with generally about having ten access categories available with reference to realizing Multiple UE, to be distinguished between the different ues with higher resolution ratio.Furthermore, it is possible to be flexibly defined by the UE for ACB Classification.For example, classification can be formed for the device attribute of variety classes and type.It is then possible to customize ACB.One Example includes joining the conceptual dependency of ACB and network slice (also sometimes referred to as network division).
Various examples described herein can be applied to network slice.It is retouched in 3GPP technology request (TR) 23.799 The example for the concept for being sliced network is stated.Network is sliced the logical partition for generally corresponding to network.In general, being directed to core Net realizes network slice.Alternately or in addition, network slice can also be realized for RAN.By the way that network to be sliced, transport Dedicated network function can be provided according to user demand by seeking quotient.For example, some network slice can be optimized to transmit specific clothes Business.For example, network slice can be used for specific business case.For example, operator can provide low by the way that network to be sliced Cost web slice, network slice provide limited performance.Can also for certain device attributes (such as device type) come Realize network slice.For example, loT and/or MTC device can be distributed to one or more dedicated network slices.
In the various examples, bans policy can be considered or distinguish different network slices.For example, can be by depending on The control parameter limited respectively forbids the access for being sliced associated UE with some network, but is not prohibited by and cuts with another network The access of the associated other UE of piece.In this way, can be sliced according to network associated with UE to distribute control parameter.
Fig. 1 is instantiated in terms of the framework of network 100.3GPP LTE is realized according to the exemplary network 100 of Fig. 1 Framework.According to 3GPP LTE, Radio Link 101 is defined in RAN 114.Radio Link 101 is limited at evolution node B (eNB) between the base station of 112 forms and one or more UE 130-1,130-2.Radio Link 101 may be implemented one or More channels, such as payload channel and/or control channel.
In addition, network 100 includes core net 113.Core net 113 is communicated with RAN 114.Core net 113 includes control layer And data Layer.Control layer includes control node, such as home subscriber servers (HSS) 115, mobility management entity (MME) 116 And "Policy and Charging Rules Function (PCRF) 119.Data Layer includes gateway node, such as gateway (SGW) 117 and grouping Data network gateway (PGW) 118.
Between UE 130-1 and the data Layer of core net 113 via RAN 114 and data are established towards access point 121 Connection 160.For example, the connection with internet or another packet data network can be established via access point 121.
The network node 115-119 of core net 113,121 general utility functions and purpose are well known in the present art, because This, is not required to be described in detail within a context.
Illustration the being given for example only property purpose of network 100 in 3GPP LTE frame.Similar technology can be by easily Applied to the framework that various 3GPP are specified, such as global system for mobile communications (GSM), Wide band Code Division Multiple Access (WCDMA), general point Group wireless service (GPRS), GSM evolution enhanced data rates (EDGE), Enhanced General Packet Radio Service (EGPRS), universal mobile telecommunications system It unites (UMTS) and high-speed packet accesses (HSPA).For example, technology described herein can be applied to 3GPP eNB-loT or MTC system or the new radio of 3GPP (NR) system.See, for example, 3GPP RP-161321 and RP-161324.Furthermore, it is possible to be easy Various technologies are applied to the network that various non-3 gpp are specified, such as bluetooth, satellite network, IEEE 802.11x Wi-Fi skill by ground Art etc..
Fig. 2 is instantiated in terms of the access barred of UE 130.UE 130 seeks to access network 100 via eNB 112. ENB 112 periodically sends system information block (SIB), for example, SIB 2.In the figure 2 example, it is sent and is connect by UE 130 Receive SIB 5001.UE 130 is not needed in order to receive SIB 5001 and is permanently attached to network 100.
SIB 5001 indicates bans policy.Then, UE 130 is configured as forbidding accessing based on bans policy 5002.
For example, control parameter can be compared with bans policy at 5002.For example, bans policy can define Ground or impliedly instruction control parameter, which should result in forbid accessing or not should result in, to be forbidden accessing.Bans policy and control This comparison between parameter may include random contribution.For example, bans policy can indicate that some control parameter causes to forbid Access or cause the probability for being not prohibited by access.Bans policy can be considered as defining the access barred for available control parameter Parametrization rule.
For example, starting to carry out UE if judging forbid UE 130 to the access of network 100 in frame 5002 130 with the initialization of the connection of network --- otherwise just abandon connecting trial, 5007.
In this way, in the figure 2 example, the UE 130 in 5007 prohibits access before initializing the connection with network. When executing 5007, UE 130 may be at off-state or Idle state: here, for example, it may be possible to can not carry out to network 100 Uplink data transmission.It may be without established channel on Radio Link 101.Data connection 160 may not set up.It can keep away Exempt from random access procedure.This can reduce network load, because forbidding checking is realized by UE.
For example, back off timer can be initialized in 5007.Back off timer can specify until access is tasted next time Duration before examination.Back off timer can be limited by bans policy or can not be limited by bans policy.
If judging that access is not prohibited at frame 5002: if using message 5003-5006, to initialize UE130 With the connection between eNB 112.
For example, firstly, UE 130 sends randomly selected random access lead code sequence 5003.For example, can be by preceding The identifier of the UE 130 of referred to as RA-RNTI is impliedly specified in the timing of the transmission of leading code 5003.
Next, eNB 112 sends physical downlink control channel (PDCCH) traffic order 5004 to UE 130, with Certain resources are distributed on Radio Link 101.
In addition, eNB 112 sends random access response 5005.The response 5005 indicates to distribute to the interim mark of UE 130 Know, i.e., so-called Cell Radio Network Temporary Identifier/Identity, Cell-RNTI (C-RNTI).In the valid period of C-RNTI, the mark and UE 130 are unique Ground is associated.
Then, it is based on message 5004 and/or 5005, UE 130 sends wireless heterogeneous networks (RRC) connection request to network 5006.RRC connection request 5006 helps to establish data connection 160 between UE 130 and network 112.
Fig. 3 is instantiated in terms of connecting between UE 130 and network 100.In the example of fig. 3, for certain companies It meets state 201-203 and defines connection between UE 130 and network 100.For example, under connected state 201, UE 130 and network 100 It is fully disconnected.In this way, network 100 may be unaware that the position of UE 130.It may not transfer uplink data.It may not Exclusive downlink data can be transferred to UE 130.
In initialization and the connection of network 100, UE 130 is transformed into connected state 203.It, may during connected state 203 Have been set up one or more carryings for data communication.For example, can establish data connection 160.In connected state 203 The address Internet Protocol (IP) can be distributed to UE 130 by period.During connected state 203, it may be possible to network 100 with Uplink control data is sent on Radio Link 101 between UE 130 and/or downlink controls data.In connected state During 203, it may be possible to which repeatedly ping UE 130 is to obtain the update about device attribute.
In Fig. 3, another state 202 is instantiated.State 202 is related to inactive state.Sometimes, inactive state 202 Referred to as disconnect state or Idle state.For example, possibly can not between UE 130 and network 100 under inactive state 202 Carry out the communication of payload data.For example, network 100 can not retain the significance bit of UE 130 under inactive state 202 It sets or routing iinformation.For example, UE 130 may be inaccessible under inactive state 202, because serving the net of UE 130 The specific cell of network 100 may be unknown.However, also can will be on some about UE 130 under inactive state 202 Context information is stored into network.This is conducive to that the initialization of connection is made to become simple when switching back into connected state 203.Some In example, inactive state 202 also can be associated with the update of the periodic Tracking Area of UE 130.For example, in inactive shape During state 202, UE can the paging of periodically response to network 100 attempt.Sometimes, in 3GPP LTE scene, inactive shape It is idle that state 202 is referred to as ECM.
In the various examples described in this article, connection can refer to the operation of the UE 130 in connected state 203.At this In the various examples of described in the text, the initialization of connection can refer to from off-state 201 (for example, in 3GPP LTE frame EMM is nullified) switching of connected state 203 (for example, the ECM connection in 3GPP LTE frame is connected with RRC) is arrived, and/or from non- Active state 202 (for example, (the ECM free time is idle with RRC) or (ECM is connected and RRC is inactive) in 3GPP LTE frame) arrives The switching of connected state 203.In such manner, it is possible to (that is, being initialized according to connected state 203 under off-state 201 and/or Idle state 202 Before connection) execute access barred.This can reduce network load, because network is not involved in access barred.
Fig. 4 is instantiated in terms of connecting between UE 130 and network 100.Fig. 4 instantiate about UE 130 with The aspect for the carrying 211,212 established between network 100.For example, data connection 160 may be implemented in carrying 211,212.
In the example of fig. 4, the connection between UE 130 and network 100 is realized by default bearing 211.Default bearing and UE 130 IP address is associated.Uplink payload data and/or downlink can be sent via default bearing 211 has Imitate load data.
In addition, the connection between UE 130 and network 100 includes dedicated bearer 212.Dedicated bearer 212 is held dependent on default Carry 211.In this way, dedicated bearer is specified by the mark of default bearing 211.For example, specific clothes can be sent via dedicated bearer 212 The uplink payload data and/or downlink payload data of business.It can not be distributed additionally for dedicated bearer 212 IP address.
It, can be for the connection realized by default bearing 211 and/or dedicated bearer 212 according to various examples herein To realize access barred.Therefore, access barred can be carried out before initialization default bearing 211 and/or dedicated bearer 212.
Fig. 5 is instantiated in terms of network slice.Particularly, Fig. 5 instantiates the side of the slice about core net 113 Face.It in other examples, alternatively or additionally, can be for RAN 114 using slice.
In the example of hgure 5, the network slice 151-153 of core net 113 is defined.Each UE 130 can be with ad hoc networks It is associated that network is sliced 151-153.For example, each UE 130 can be associated with slice mark.Slice mark can indicate network Specific one be sliced in 151-153.Then, when initialization and the connection of network 113, based on to and from UE's 130 Slice mark, signaling are routed to corresponding network slice 151-153.
In the various examples described in this article, access barred can be realized based on slice mark.In this way, for accessing The control parameter forbidden may include slice mark.
Fig. 6 is instantiated in terms of control parameter 5013.In the example of fig. 6, control parameter is (special from network 100 It is to be sent to UE 130 from eNB 112).Control parameter is used for the access for selectively forbidding terminal 130 to network 100.This Sample, control parameter can form the decision basis for selectively forbidding access.
According to various examples described herein, control parameter can be limited by network in the network 100.In showing for Fig. 6 In example, at frame 5012, control parameter is selected by eNB 112.However, according to various examples, for selecting control parameter 5013 Logic can not also be at eNB 112, but at another network node (for example, MME116 or HSS 115).
In the various examples described in this article, it is contemplated that for selecting the difference of control parameter 5013 at frame 5012 Decision criteria.For example, selecting control parameter based on the device attribute 5011 of UE 130 at frame 5012 according to the realization of Fig. 6 5013.In some instances, device attribute 5011 can be signaled by UE 130, then be received by eNB 112.In other words It says, UE 130 can report device attribute 5011 to network 100.For example, UE 130 can receive control ginseng from network 100 The feedforward network 100 of number 5013 sends the indicator of indicating equipment attribute.It in other examples, can be from different from UE's 130 Another entity obtains device attribute 5011.For example, can be obtained from network node as such as HSS 115 and/or MME 116 Device attribute 5011.
According to various examples, at frame 5012, different device attributes 5011 can be considered when determining control parameter.Show Example includes the communication capacity of UE 130;The device type of UE 130;Network associated with UE 130 is sliced 151-153;UE 130 access category;And the operator of subscriber associated with UE 130.
For example, communication capacity can be limited to certain communication protocols (such as 2G, 3G, 4G, upcoming 5G, NB-IOT Deng) support.For example, communication capacity can limit the frequency band of support.
Therefore, specific implementation is depended on, device attribute 5011 can change.Then, similarly, at frame 5012, it is used for Determine that the specific selection mechanism of control parameter can correspondingly change.
Once control parameter 5013 has been received in UE 130, then in frame 5014, UE 130 can be according to control parameter 5013 selectively forbid UE 130 to access network (referring to fig. 2) for subsequent connection.
For example, control parameter 5013 may include uniquely/be explicitly assigned to UE 130 UE 130 dynamic marks. It is thus impossible to which enough fixedly distribute dynamic marks by that will identify to be hard coded into SIM.For example, dynamic marks can be net What network limited.For example, mark can have certain validity period.After the validity period, the validity of mark can be expired.Example Such as, validity period can be realized by many purposes, for example, for disposable.For example, validity period can be by until weight Validity until new distribution is realized.For example, validity period can be realized by timer.It is then possible to again by dynamic marks Distribute to such as another UE.
Then, by using bans policy appropriate, consider the dynamic marks of UE 130 being previously assigned, it can be selective Forbid or be not prohibited by access of the UE 130 to network 100 in ground.In one example, the dynamic marks of UE 130 can be C-RNTI (referring to fig. 2: 5005).Here it is possible to will control during the initialization accordingly connected (for example, during random access procedure) Parameter 5013 is transmitted to UE 130 from network 100.This makes it possible to be reused as a part of random access with any side The C-RNTI that formula is sent.
In another example, control parameter 5013 can be sliced the mark of 151-153 by network associated with UE 130 Know to realize.
These technologies make it possible to use for different network operators and/or network slice and/or device type etc. Different control parameters 5013, and therefore use different access barreds.It is further possible to change control dynamically as needed Parameter 5013.For example, if it find that some UE 130 is carrying out very frequent access attempts, then it can be true for the UE 130 Determine specific control parameter 5012 and be signaled to the UE 130, to continue to attempt to initialization connection.
In general, these technologies described herein can be applied to the access barred for UE, individually forbid or It is not prohibited by the access of some UE 130.However, alternately or additionally, these technologies described herein can also be carried out use In the ACB for forbidding or being not prohibited by a kind of access of UE 130.
Fig. 7 is instantiated in terms of ACB.In detail, Fig. 7 is instantiated in terms of bans policy 300.Fig. 7's In example, the control parameter 5013 for distributing to different UE 130 is grouped into classification 301-303.For example, classification 301 is cut with network Piece 151 is associated.In this way, associated with network slice 151 all control parameters 5013 are (for example, correspond to network slice The unique identification of mark and/or UE 130) it is assigned to classification 301.Similarly, classification 302 corresponds to network slice 152;And And classification 303 corresponds to network slice 153.
In some instances, the network node for being responsible for distribution control parameter can be based on the relevant device category of given UE 130 Property identify associated with given UE 130 network slice 151-153.Then, UE can choose classification 301-303 appropriate. Each classification 301-303 can comprise more than a member, that is, may include uniquely being associated with corresponding classification 301-303 Control parameter space.Then, network node can select and the corresponding network of terminal from selected classification 301-303 It is sliced the associated specific control parameter of 151-153.These technologies can also be used for the control of the classification of other types and type Parameter processed.These technologies facilitate dynamic ACB.
In the example in figure 7, bans policy 300 is specified allows to have and classification 301,302 associated control parameters The access of 5013 all UE.Bans policy 300 is also specified to forbid the UE with control parameter 5013 associated with classification 303 130 are linked into network 100 (being indicated by the dotted line filling region in Fig. 7).One example, which can be, forbids belonging to the confession of some electric power The access of all intelligent meters (associated with network slice 153) of quotient is answered, while allowing to belong to the institute of some gas supplier There is access of the intelligent meter (it is associated to be sliced 151,152 with network) to network.
In the scene of Fig. 7, the bans policy 300 for being transmitted to UE 130, which may not explicitly indicated, to be prohibited to access net All control parameters 5013 of network 100.If control parameter is uniquely attributed to UE 130, this may be particularly useful, because If not being uniquely attributed to UE 130 for control parameter, it may be necessary to send UE for a control parameter long list 130.On the contrary, bans policy 300 can indicate all control parameters 5013 forbidden in a manner of parametrization, this makes UE 130 can conclude that whether its unique and individual control parameter 5013 is actually prohibited to access.This may include bans policy 300 and/or control parameter 5013 some processing.In other words, bans policy can be indicated for forbidding being linked into network 100 Control parameter 5013 classification.It is this parametrization instruction another example is use modular function.For example, UE 130 can pass through Mould (10) are executed to the unique identifier (such as C-RNTI) of storage to calculate the dynamic access classification indicated by bans policy.Make Signaling overheads can be reduced with compression/parameterized form bans policy.
In general, in the various examples described in this article, the access of terminal can be forbidden based on multiple control parameters.This Multilayer can be referred to as to forbid, because determining to have to check for multiple standards when forbidding or being not prohibited by.For example, can be based on Access barred is realized by the combination of the temporary identifier of network distribution.For example, some slice 151-153 can be defined as include It may forbidden UE.It is then possible to forbid being connected to the particular slice and all UE with C-RNTI mould (10)=0.
In general, bans policy 300 specifies whether some UE 130 is prohibited to access network 100 in which can determine.Optionally Or additionally, probability can also be used.For example, different access categories can with become some forbidden statistical likelihood phase Association.This scene is instantiated in fig. 8.
Fig. 8 is instantiated in terms of bans policy 300.The scene of Fig. 8 generally corresponds to the scene of Fig. 7.However, instead of Deterministically forbid certain classification 301-303, according to the example of Fig. 8, bans policy 300 may include forbidding having falling into accordingly A possibility that 130 UE of related control data in classification 301-303.
For example, classification 301 is 20% associated with probability is prohibited.Namely based on some random contribution, there is classification 301 The UE 130 of middle control parameter 5013 is prohibited or is not prohibited by access network 100.Differently, for being controlled in classification 302 The UE of parameter 5013 processed, forbidden possibility are equal to 0%.For the UE 130 with control parameter 5013 in classification 303, quilt A possibility that forbidding is equal to 100%.
In the various examples described in this article, control signaling can be used to send bans policy 300.Control signaling can To be the 1st layer, the 2nd layer or the 3rd layer of signaling in osi layer model.It is, for example, possible to use forbid bitmap to send bans policy 300.Forbid bitmap that can specify for the classification of each control data and/or control data and individually forbids information.
Fig. 9 is instantiated in terms of bans policy 300.Particularly, Fig. 9 is instantiated about Limited service quality (QoS) The aspect of the bans policy 300 of threshold value 355 (horizontal dotted line in Fig. 9).
Fig. 9, which is also illustrated, seeks initialization Service Quality associated with the service of the connection of network 100 with corresponding UE 130 Amount 351.For example, can in the application layer of osi layer model Limited service.For example, service can be with certain payload datas It is associated.For example, the service can be related to music stream, audio call, internet, packet data network connection etc..
In addition, what is illustrated in Fig. 9 is QoS benchmark 352.As from Fig. 9 it will be apparent that being limited relative to QoS benchmark 352 The QoS 351 of service keeps below QoS threshold 355.Such scene can correspond to that UE130 is forbidden to access network 100.It is different Ground, if being more than the QoS threshold 355 limited by bans policy 300 relative to the QoS 351 that QoS benchmark 352 limits, this can It can relate to be not prohibited by access network 100.
In some instances, QoS benchmark 352 may be derived from the control parameter 5013.For example, based on unique control ginseng Number 5013 can determine different QoS benchmark 352 for different UE 130.For example, can be directed to associated with UE 130 Heterogeneous networks slice 151-153 determines different QoS benchmark 352.
In one example, be able to use C-RNTI as in conjunction with QoS (for example, being expressed as 3GPP LTE QoS classification Identifier (QCI)) UE 130 unique identification, to realize priority difference between external network, but still in local network QoS is used in network.Here, C-RNTI can limit QoS benchmark 352.For example, the C- combined with the QCI corresponding to QoS 351 RNTI mould (10)+1=1 can provide the number lower than C-RNTI mould (the 10)+1=2 combined with identical QCI value.If forbidding plan Slightly 300 QoS threshold 355 is suitably specified, then this makes it possible to dynamically change heterogeneous networks slice by C-RNTI Priority between 151-153;In each classification 301-303 associated with heterogeneous networks slice 151-153, it can be based on QoS 351 carries out priority ranking to business.Therefore, it can be distributed for access barred between network in priority and network Priority.Such example is based on the C-RNTI of the unique identification of UE 130 not only to realize, but also can be easy Ground is applied to the variety classes of UE 130 and the unique identification of type.
In other examples, control data 5013 can limit threshold value 355, and bans policy can limit QoS benchmark 352.Under any circumstance, bans policy can specify qos requirement.
Figure 10 is signaling diagram.Figure 10 is instantiated in terms of transmission bans policy 300.In the example in Figure 10, UE 130 to network 100, particularly sends request 5021 to eNB 112.In response to receiving the request, eNB 112, which sends instruction, to be prohibited The only response 5022 of strategy 300.In this way, UE 130 can be configured as requesting bans policy 300 from network 100.
If such compared with bans policy 300 is broadcasted repeatedly the scene of (for example, a part as SIB) Scene can contribute to reduce the control overhead on Radio Link 101.Therefore complicated in bans policy 300 simultaneously includes big data word In the case where section, this may be especially true.In this case, bans policy 300 is sent directly to UE as needed 130 can be more efficient.
Next, UE 130 checks if it should forbid accessing network 100 at frame 5023.For example, at frame 5023, UE 130 can check the update of bans policy 300.
In general, in the various examples described in this article, can divide by updating bans policy 300 and/or by updating The control parameter 5013 of dispensing particular UE 130 realizes the dynamic attribute of access barred.For example, being responsible for distribution control parameter Network node can monitor the business load of multiple networks.Then, network node can be based on the monitoring come by new control Parameter is reassigned to terminal.For example, being capable of forming more by one or more control parameters for redistributing various terminals Stringent or loose forbids.General, it may be desirable to control parameter 5013 be updated, for example, distributing to the interim mark of particular UE 130 Know, rather than updates bans policy 300.This can aid in the expense for reducing the control signaling on Radio Link 101, because logical Normal bans policy 300 can have significant size.It is thus possible to more dedicated access barred function enough be realized, because of network 100 for example dynamically can distribute control parameter according to the device attribute of particular UE 130 and/or newest network slice Different value.
Figure 11 is instantiated in terms of UE 130.UE includes processor 1301.UE further includes memory 1302.Memory 1302 can be nonvolatile memory.Memory 1302 can store program code.Program code can be by processor 1301 It executes.Executing program code can make processor 1301 execute various technologies described herein, be related to: as such as ACB Access barred, to network sending device attribute, receive and store control as the mark that such as dynamic marks or network are sliced Parameter etc..
Figure 12 is the flow chart according to each exemplary method.For example, can be by UE's 130 according to the method for Figure 12 Device 1301 is managed to execute.
Firstly, receiving control parameter in frame 6001.Control parameter is received in the first connection.For example, can be first The received during initialization control parameter of connection.Alternately or in addition, control can be received after being successfully established the first connection Parameter processed.
Control parameter can indicate the unique identification of UE.For example, unique identification can be it is interim.Control parameter can also be with It is not uniquely attributed to UE.For example, control parameter can indicate network slice associated with UE.Because network slice can be with The multiple UE of trustship, so in such a case it is not necessary to control parameter is assigned uniquely to UE.
It is then possible to storing control parameter, to use control parameter to carry out access barred later.For example, in frame 6001 It between frame 6002, may pass the plenty of time, for example, several minutes, a few hours or a couple of days.For example, in frame 6001 and frame Between 6002, the various changes of the connected state of UE can occur, for example, being transformed into off-state and/or Idle state from connected state.
Particularly, in frame 6002, it is based on control parameter, selectively forbids accessing network for the second connection.Second Connection can be different from the first connection.For example, can second connection initialization during or second connection initialization it It is preceding selectively to forbid accessing network.For example, step 6002 can be executed before being switched to connected state from Idle state.For example, Can establish such as default bearing or dedicated bearer as carry before or period execute step 6002.
Forbid access that can be related to preventing from sending access attempts or connection request to network in frame 6002.In frame 6002 The connection for forbidding access that can be related to abandoning with network is attempted.Particularly, the logic of frame 6002 can be in UE, so as to subtract Shaoshi is added in the load on network (at two aspect of signaling and processing).
Figure 13 is instantiated in terms of eNB 112.ENB 112 includes processor 1121 and memory 1122.For example, depositing Reservoir 1122 can be nonvolatile memory.Memory 1122 can store program code.Program code can be by processor 1121 execute.Processor 1121 can be made to execute various technologies described herein for example, executing program code.These technologies can To comprise determining that the control parameter for UE;The control parameter for UE is determined based on the device attribute of UE;From UE and/or Another network node receiving device attribute;Monitoring business loads and configures access barred etc. based on the monitoring.
About Figure 13, eNB 112 has been directed to it and has explained various aspects.However, these technologies can also be applied to network Other network nodes as 100 such as gateway 117,118 and/or control node 115,116,119.
Figure 14 is the flow chart according to various exemplary methods.It can be by the processor of eNB 112 according to the method for Figure 14 1121 execute.Similarly, according to the method for Figure 14 another net as such as gateway node or control node of network Network node executes.
In frame 6011, UE is sent by control parameter.UE is sent by control parameter in the first connection.Control parameter Access barred of the enabling/promotion UE in subsequent second connection.
For example, this method can also include determining control parameter before sending control parameter.For example, if will access Forbid realizing as ACB, then can select the classification of control parameter based on device attribute.For example, device attribute can be at certain It is grouped in a little classifications.Then, according to the grouping, particular category can be identified.Each classification can have associated therewith The space of the control parameter of connection;It is then possible to select specific control parameter from the classification of control parameter.For example, such as Fruit device attribute indicates some network slice associated with UE, then can select control parameter associated with network slice Classification.For example, some network slice can have a certain amount of control parameter, each control parameter uniquely identifies available It is associated with UE.It is then possible to select specific control parameter from those of being limited by the classification of control parameter in candidate control parameter.
In some instances, control parameter can be sent when dynamically updating access barred attribute.For example, can monitor The business load of multiple network slices.Then, if business load be more than some threshold value, can distribute new control parameter with Just tightened up access barred strategy is realized.It then, can be for example in push communication using updated control parameter as frame 6011 a part is sent to UE.Alternately or in addition, additionally it is possible to which bans policy is updated based on the monitoring to business load. Then, UE for example can be sent to using updated bans policy as a part of frame 6011 in push communication.
In other examples, this method can also include sending bans policy to UE.Which control is bans policy can specify Parameter processed is limited by access barred.For example, the business load of multiple network slices can be monitored again.It is then possible to based on pair The classification of business load monitored to select control parameter.For example, can choose and to be limited by tightened up access barred Some network is sliced the classification of associated control parameter.Then, once having identified the classification of control parameter, it will be able to UE sends updated bans policy, and bans policy instruction is for forbidding accessing the selected control parameter classification of network.
In a word, it has been described that can be realized the above-mentioned technology that dynamic access is forbidden.Compared with the reference of ACB is realized, this A little technologies provide certain advantages.For example, the RAN realized according to reference usually only has, there are two types of priorization/control business hands Section.A kind of scene is using traffic filter information as such as QCI.Another scene is in congestion/traffic overload feelings Forbid user under condition.It has been found that certain types of service in network are usually arranged (for example, audio call or internet industry in QCI value Business) priority.However, this QCI will not provide between any network since network slice can be considered as dedicated network Priority.ACB is the means for reducing the business in RAN.However, the reference of ACB, which is realized, uses blind statistic law.Therefore, according to ginseng Realization is examined, priority between network can not be provided.In addition, in shared RAN (that is, being used by the operator that multiple networks are sliced RAN) in, RAN will be each operator realize have equal priority ACB.
This is based on the discovery that be based in accumulation (accruing) subscriber identity module according to the ACB that reference is realized It is supplied to the static state and predefined number of user.For example, being realized according to reference, access category 0-9 uniformly divides between devices Cloth.
Differently, according to various examples described herein, interim control parameter can be distributed into UE by network.Control Parameter can be used for realizing access barred.It, can according to the restriction of control parameter and/or according to the restriction of corresponding bans policy Realize the specific access barred of equipment and/or ACB.
Although being directed to certain preferred embodiments has shown and described the present invention, is reading and understanding specification Later, those skilled in the art will expect equivalent and modification.The present invention includes all these equivalents and modification, and only by The scope limitation of the attached claims.

Claims (21)

1. a kind of terminal (130,130-1,130-2), the terminal is configured as connecting in the terminal with the first of network (100) Control parameter (5013) are received from the network (100) via Radio Link (101) in (203,211,212),
Wherein, the terminal (130,130-1,130-2) is additionally configured to based on the control parameter (5013), for subsequent Second connection (203,211,212) selectively forbids the terminal (130,130-1,130-2) to connect the network (100) Enter.
2. terminal (130,130-1,130-2) according to claim 1,
Wherein, the terminal is configured as forbidding the access before the initialization of second connection (203,211,212).
3. terminal (130,130-1,130-2) according to claim 1 or 2,
Wherein, second connection (203,211,212) includes and the IP address of the terminal (130,130-1,130-2) is related The default bearing (160,211) and/or dedicated bearer associated with the default bearing (160,212) of connection.
4. terminal (130,130-1,130-2) according to any one of the preceding claims,
Wherein, the terminal (130,130-1,130-2) is configured as the Idle state in the terminal (130,130-1,130-2) (202) and/or under off-state (201) forbid accessing.
5. terminal (130,130-1,130-2) according to any one of the preceding claims,
Wherein, the control parameter (5013) includes that terminal (130,130-1, the 130- are assigned uniquely to by the network 2) dynamic marks.
6. terminal (130,130-1,130-2) according to any one of the preceding claims,
Wherein, the control parameter (5013) include the network (100), with the terminal (130,130-1,130-2) phase The mark of associated network slice (151-153).
7. terminal (130,130-1,130-2) according to any one of the preceding claims,
Wherein, the control parameter (5013) includes Cell Radio Network Temporary Identity C-RNTI.
8. terminal (130,130-1,130-2) according to any one of the preceding claims,
Wherein, the terminal (130,130-1,130-2) is configured as the initialization in first connection (203,211,212) Period receives the control parameter (5013).
9. terminal (130,130-1,130-2) according to any one of the preceding claims,
Wherein, the terminal (130,130-1,130-2) is configured as receiving the control parameter from the network (100) (5013) network is sent by the indicator for indicating the device attribute of the terminal (130,130-1,130-2) before (100),
Wherein, the device attribute includes one or more in following item: the terminal (130,130-1,130-2) is led to Letter ability;The device type of the terminal (130,130-1,130-2);The network (100), with the terminal (130, 130-1,130-2) associated network slice (151-153);The access category of the terminal (130,130-1,130-2);With And the operator of subscriber associated with the terminal (130,130-1,130-2).
10. terminal (130,130-1,130-2) according to any one of the preceding claims,
Wherein, the terminal (130,130-1,130-2) is configured as receiving bans policy from the network (100),
Wherein, the terminal (130,130-1,130-2) is configured as being based further on the bans policy to forbid described connect Enter.
11. terminal (130,130-1,130-2) according to claim 10,
Wherein, the bans policy includes quality of service requirement,
Wherein, the terminal (130,130-1,130-2) is configured as being based further on the quality of service requirement and described the Two connect the comparison of the service quality of (203,211,212) to forbid the access.
12. terminal described in 0 or 11 (130,130-1,130-2) according to claim 1,
Wherein, the terminal (130,130-1,130-2) is configured as requesting the bans policy from the network (100).
13. terminal described in any one of 0-12 (130,130-1,130-2) according to claim 1,
Wherein, the class for the control parameter (5013) that the bans policy instruction forbids the access to the network (100) targeted Not.
14. a kind of network node (112,115-118) of network (100), the network node (112,115-118) are configured as It is connect in (203,211,212) with the first of terminal (130,130-1,130-2) via Radio Link (101) in the network node Control parameter (5013) are sent to the terminal (130,130-1,130-2), the control parameter (5013) makes the terminal (130,130-1,130) can forbid the access to the network (100) for subsequent second connection (203,211,212).
15. network node (112,115-118) according to claim 14,
Wherein, the network node (112,115-118) is configured as the equipment for receiving the terminal (130,130-1,130-2) Attribute,
Wherein, the network node (112,115-118) is configured as determining the control parameter based on the device attribute (5013)。
16. network node (112,115-118) according to claim 15,
Wherein, the network node (112,115-118) is configured as selecting control parameter based on the device attribute (5013) classification,
Wherein, the network node (112,115-118) is configured as selecting the control parameter (5013) from the classification.
17. network node (112,115-118) according to claim 15 or 16,
Wherein, the element that the device attribute instruction is selected from the group including following item: terminal (130,130-1, the 130- 2) communication capacity;The device type of the terminal (130,130-1,130-2);The network (100), with the terminal (130,130-1,130-2) associated network slice (151-153);The access class of the terminal (130,130-1,130-2) Not;And the operator of subscriber associated with the terminal (130,130-1,130-2).
18. network node described in any one of 4-17 (112,115-118) according to claim 1,
Wherein, the network node (112,115-118) is configured as monitoring the business load of the network (100),
Wherein, the network node be configured as based on the monitoring to the business load come to the terminal (130, 130-1,130-2) redistribute new control parameter.
19. a kind of method, which comprises
Terminal first connecting in (203,211,212) and connect from the network (100) between the terminal and network (100) It receives control parameter (5013), and
The terminal is based on the control parameter (5013), connects for subsequent second between the terminal and the network It connects (203,211,212) and selectively forbids access to the network (100).
20. a kind of method, which comprises
With the first of terminal (130,130-1,130-2) connect in (203,211,212) to the terminal (130,130-1, Control parameter (5013) 130-2) are sent, the control parameter (5013) makes the terminal (130,130-1,130-2) being capable of needle Access to the network (100) is forbidden to subsequent second connection (203,211,212).
21. a kind of system, the system comprises:
Terminal (130,130-1,130-2), and
Network node (112,115-118),
Wherein, the network node is configured as in the first connection between the terminal and the network node via wireless Terminal described in chain road direction sends control parameter,
Wherein, the terminal is configured as selectively forbidding for subsequent second connection to institute based on the control parameter State the access of network.
CN201680089772.4A 2016-10-07 2016-10-07 Dynamic access prohibition method, wireless communication terminal, network node and system Active CN109804670B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/EP2016/073996 WO2018065065A1 (en) 2016-10-07 2016-10-07 Dynamic access barring

Publications (2)

Publication Number Publication Date
CN109804670A true CN109804670A (en) 2019-05-24
CN109804670B CN109804670B (en) 2021-12-03

Family

ID=57104034

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201680089772.4A Active CN109804670B (en) 2016-10-07 2016-10-07 Dynamic access prohibition method, wireless communication terminal, network node and system

Country Status (4)

Country Link
US (1) US12022376B2 (en)
EP (1) EP3524014B1 (en)
CN (1) CN109804670B (en)
WO (1) WO2018065065A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022151366A1 (en) * 2021-01-15 2022-07-21 Lenovo (Beijing) Limited Disabling uplink transmission within disabling period

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10841184B2 (en) * 2017-03-28 2020-11-17 Huawei Technologies Co., Ltd. Architecture for integrating service, network and domain management subsystems
KR102631588B1 (en) 2017-08-11 2024-02-02 삼성전자 주식회사 Method and apparatus for supporting additional uplink frequencies in next-generation mobile communication systems
CN113678508B (en) * 2019-03-28 2023-06-30 上海诺基亚贝尔股份有限公司 Cell quality based access control barring

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102300285A (en) * 2011-09-29 2011-12-28 电信科学技术研究院 Access control method and equipment
CN102740374A (en) * 2011-04-01 2012-10-17 中兴通讯股份有限公司 Access control method and system thereof
CN102761933A (en) * 2011-04-29 2012-10-31 中兴通讯股份有限公司 Processing method and device for EAB (Extended Access Barring), access processing method, device and system
CN103096418A (en) * 2011-11-04 2013-05-08 中兴通讯股份有限公司 Access control implementation method and system
WO2014053170A1 (en) * 2012-10-02 2014-04-10 Nokia Siemens Networks Oy Method and apparatus
WO2016027133A1 (en) * 2014-08-21 2016-02-25 Telefonaktiebolaget L M Ericsson (Publ) Access control for connected network user devices
CN105556994A (en) * 2013-10-31 2016-05-04 英特尔Ip公司 User equipment and evolved node-b and methods for operation in a coverage enhancement mode
CN105792382A (en) * 2016-05-24 2016-07-20 电子科技大学 Massive terminal access overload control method based on ACB

Family Cites Families (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7100020B1 (en) * 1998-05-08 2006-08-29 Freescale Semiconductor, Inc. Digital communications processor
US20070192606A1 (en) * 2004-03-08 2007-08-16 Yutaka Yasukura Electronic terminal device protection system
JP2006100301A (en) 2004-09-28 2006-04-13 Nitto Denko Corp Wiring circuit board device and connection structure
KR100610481B1 (en) 2004-12-30 2006-08-08 매그나칩 반도체 유한회사 Image sensor with enlarged photo detecting area and method for fabrication thereof
GB2443233B (en) 2006-10-16 2011-04-13 Nec Technologies Network overload protection
US8254294B2 (en) * 2007-05-18 2012-08-28 Nokia Corporation System and method for providing local IP breakout services employing access point names
US8108517B2 (en) * 2007-11-27 2012-01-31 Umber Systems System and method for collecting, reporting and analyzing data on application-level activity and other user information on a mobile data network
US9258286B1 (en) * 2008-07-30 2016-02-09 United Services Automobile Association (Usaa) Systems and methods for communications channel authentication
US9357247B2 (en) * 2008-11-24 2016-05-31 Time Warner Cable Enterprises Llc Apparatus and methods for content delivery and message exchange across multiple content delivery networks
JP5316867B2 (en) * 2009-03-04 2013-10-16 日本電気株式会社 License management system, license management method, and license management program
WO2013025148A1 (en) 2011-08-15 2013-02-21 Telefonaktiebolaget L M Ericsson (Publ) Network access delay for extended access barring (eab) configured user equipments and/or group-based addressed user equipments
US9485235B2 (en) * 2012-03-02 2016-11-01 Qualcomm Incorporated Systems and methods for inter-network service selection
EP3823345B1 (en) * 2012-03-21 2022-07-13 Samsung Electronics Co., Ltd. Granular network access control and methods thereof
CN103368930B (en) * 2012-03-27 2017-11-28 华为技术有限公司 The method and user equipment of core net are accessed for controlling
EP2892188B1 (en) * 2012-09-25 2017-08-30 Huawei Technologies Co., Ltd. Method for determining packet forwarding path, network device and control device
KR101827659B1 (en) * 2013-10-30 2018-02-08 인터디지탈 패튼 홀딩스, 인크 Systems and methods for handling priority services congestion
US9462026B2 (en) * 2014-07-31 2016-10-04 Senza Tech, Llc Communicating multimedia data
US9380536B2 (en) * 2014-09-09 2016-06-28 Qualcomm Incorporated Enhanced device selection algorithm for device-to-device (D2D) communication
CN105120505B (en) * 2015-07-28 2019-04-16 小米科技有限责任公司 The method, apparatus and system of smart machine couple in router
US20170046529A1 (en) * 2015-08-13 2017-02-16 Sharewell Ltd Apparatus system and method

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102740374A (en) * 2011-04-01 2012-10-17 中兴通讯股份有限公司 Access control method and system thereof
CN102761933A (en) * 2011-04-29 2012-10-31 中兴通讯股份有限公司 Processing method and device for EAB (Extended Access Barring), access processing method, device and system
CN102300285A (en) * 2011-09-29 2011-12-28 电信科学技术研究院 Access control method and equipment
CN103096418A (en) * 2011-11-04 2013-05-08 中兴通讯股份有限公司 Access control implementation method and system
WO2014053170A1 (en) * 2012-10-02 2014-04-10 Nokia Siemens Networks Oy Method and apparatus
CN105556994A (en) * 2013-10-31 2016-05-04 英特尔Ip公司 User equipment and evolved node-b and methods for operation in a coverage enhancement mode
WO2016027133A1 (en) * 2014-08-21 2016-02-25 Telefonaktiebolaget L M Ericsson (Publ) Access control for connected network user devices
CN105792382A (en) * 2016-05-24 2016-07-20 电子科技大学 Massive terminal access overload control method based on ACB

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022151366A1 (en) * 2021-01-15 2022-07-21 Lenovo (Beijing) Limited Disabling uplink transmission within disabling period

Also Published As

Publication number Publication date
EP3524014B1 (en) 2022-04-13
EP3524014A1 (en) 2019-08-14
WO2018065065A1 (en) 2018-04-12
US20190246332A1 (en) 2019-08-08
CN109804670B (en) 2021-12-03
US12022376B2 (en) 2024-06-25

Similar Documents

Publication Publication Date Title
CN110662261B (en) Resource allocation method and device for network slices
CN111052790B (en) Enhancement processing of a quality of service flow description
CN110519802B (en) Data processing method, data sending method and data sending device
US11729704B2 (en) Radio terminal, base station, and method therefor
EP2665310B1 (en) Access control method and device
US9125137B2 (en) Method and terminal for applying an extended access barring
CA2844411C (en) Extended access barring
CN105745945B (en) Control the data transmission of the machine type communication in mobile communication system
US20210153088A1 (en) Network flow measurement method, network measurement device, and control plane device
CN109891962A (en) Method and the network equipment for respond request
CN109891829A (en) SLA processing in network slice
CN109196913B (en) Universal access control method and user equipment in new radio system
CN108781361B (en) Method and apparatus for processing data packets
US20130122921A1 (en) Dynamic optimization of radio network resources based on user equipment type
CN109804670A (en) Dynamic access is forbidden
US20210259041A1 (en) System and method of radio resource management for radio access networks
WO2021093166A1 (en) A method of quality of service control for a specific user equipment in a slice
US20230379764A1 (en) System and method for selecting network slices based on network slice congestion information
CN106559800B (en) Joint evaluation method and device for Radio Resource Management (RRM) measurement event
WO2014114525A1 (en) Access network selection policy
EP4068855A1 (en) Method for recommending target cell for handover in open-radio access network environment
US20230308939A1 (en) Technique for controlling performance management depending on network load
WO2022049082A1 (en) Technique for barring a radio device from radio access in a radio access network
CN116711458A (en) Information transmission method and communication device
CN117796027A (en) Communication indication method, first network element, second network element and core network equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant